Module and Programme Catalogue

Search site

Find information on

2015/16 Undergraduate Module Catalogue

COMP2446 Information Management and Security

20 creditsClass Size: 90

Module manager: Dr Olaf Beyersdorff
Email: o.beyersdorff@leeds.ac.uk

Taught: Semesters 1 & 2 (Sep to Jun) View Timetable

Year running 2015/16

Pre-requisites

COMP1551Core Programming

This module is not approved as a discovery module

Objectives

On completion of this module, students should be able to:
- Identify the main functions of a database management system (DBMS)
- Describe the architecture of a relational database system
- Produce a relational schema from an entity-relationship conceptual model.
- Explain the distinction between procedural and declarative queries and
the meaning and significance of relational completeness.
- Express simple queries using relational algebra and relational calculus.
- Determine functional dependencies and use inference rules to generate functional dependencies.
- Use SQL to create, maintain and manipulate data in a relational database.
- Determine what normal form a table is in, and explain the advantages and disadvantages of normalization.
- Explain the importance of information systems not based on the relational model.

- Describe the types of threats to data and information systems
- Describe the purpose of cryptography and list ways it is used in data communications
- Understand global principles for the design of efficient and secure cryptographic algorithms
- Understand mathematical foundations of symmetric and public-key cryptography
- Discuss complexity-theoretic assumptions for the design of secure and efficient cryptosystems
- Discuss the different cryptographic primitives and the work function of each
- Identify the common type of crytographic attacks and describe how the attack can occur
- Describe how cryptographic primitives can be employed to design complex cryptographic protocols
- Describe the architecture for public and private key cryptography and how PKI supports network security

Syllabus

- History of, motivation for, and functions of database systems
- The relational data model
- Mapping conceptual schemas to relational schemas.
- Foundations of procedural and declarative query languages:
relational algebra, relational calculus, relational completeness,
connections with other logical formalisms including 1st order logic.
- Functional dependencies, Armstrong's axioms and other inference rules
- Normal forms: 1NF, 2NF, 3NF, BCNF and selected higher normal forms
- SQL including data definition, queries, and integrity constraints
- Relational database design including applications of normalization
- Non-relational / NoSQL databases (e.g. OO, graph, triplestore)

-Information Assurance Concepts (Confidentiality, Integrity, Availability)
- Cryptography: history, main goals, security requirements
- Types of attacks to cryptosystems
- Symmetric cryptosystems: DES, AES, operation modes
- Mathematical background from number theory and finite fields
- Efficient algorithms for arithmetic and primality
- Public-key cryptography: Diffie-Hellman key exchange, RSA, ElGamal
- Digital signatures
- Hash functions, their use and security
- Cryptographic protocols: bit commitment, electronic voting
- Network security, network attack types
- Use of cryptography for network security

Teaching methods

Delivery typeNumberLength hoursStudent hours
Class tests, exams and assessment13.003.00
Lecture441.0044.00
Practical41.004.00
Private study hours149.00
Total Contact hours51.00
Total hours (100hr per 10 credits)200.00

Methods of assessment


Coursework
Assessment typeNotes% of formal assessment
Assignment4 hour assignment5.00
Assignment4 hour assignment5.00
Problem SheetProblem Sheet 15.00
Problem SheetProblem Sheet 25.00
Total percentage (Assessment Coursework)20.00

This module is re-assessed by exam only.


Exams
Exam typeExam duration% of formal assessment
Standard exam (closed essays, MCQs etc)3 hr 00 mins80.00
Standard exam (closed essays, MCQs etc)2 hr 00 mins0.00
Total percentage (Assessment Exams)80.00

This module is re-assessed by exam only.

Reading list

There is no reading list for this module

Last updated: 05/11/2015

Disclaimer

Browse Other Catalogues

Errors, omissions, failed links etc should be notified to the Catalogue Team.PROD

© Copyright Leeds 2019